Author of the publication

Security Risk Assessment Methodologies in The Internet of Things: Survey and Taxonomy.

, , and . QRS Companion, page 668-675. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards quantification and evaluation of security of Cloud Service Providers., and . J. Inf. Secur. Appl., (2017)Detecting SQL Injection Attacks in Cloud SaaS using Machine Learning., , and . BigDataSecurity/HPSC/IDS, page 145-150. IEEE, (2020)Artificial Intelligence f or Cybersecurity in IoT-enabled Avionics: Challenges and Solutions., , , and . WF-IoT, page 1-8. IEEE, (2022)A deep learning approach for proactive multi-cloud cooperative intrusion detection system., , , and . Future Gener. Comput. Syst., (2019)Community Detection Algorithm for Mitigating Eclipse Attacks on Blockchain-enabled Metaverse., , and . MetaCom, page 403-407. IEEE, (2023)Safe Reinforcement Learning via Observation Shielding., , , , , and . HICSS, page 6603-6612. ScholarSpace, (2023)Trust-Based Cooperative Game Model for Secure Collaboration in the Internet of Vehicles., and . ICC, page 1-6. IEEE, (2019)A Game-Theoretic Approach for Distributed Attack Mitigation in Intelligent Transportation Systems., , and . NOMS, page 1-6. IEEE, (2020)Toward Secure Resource Allocation in Mobile Cloud Computing: A Matching Game., , and . ICNC, page 370-374. IEEE, (2019)A Decentralized Reputation Management System for Securing the Internet of Vehicles., , , and . ICNC, page 900-904. IEEE, (2019)